Password-based logon schemes have many security weaknesses. Smart card and biometric based authentication solutions are available as a replacement for standard password-based schemes for security sensitive environments. However, the cost of deployment and maintenance of these systems is quite high. On the other hand, mobile network operators have a huge base of deployed smart cards that can be reused to provide authentication in other areas significantly reducing costs. This master’s thesis presents a study of how the workstation identity management can be made more secure and user-friendly by using a mobile phone in the Windows workstation logon process. Two workstation logon schemes that utilize both the mobile phone and the UICC inside o...
The paper presents the process of user authentication on Windows operating systems. What is also dis...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Abstract The design of authentication methods raises crucial questions on how to solve conflicts bet...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password based logon schemes have many security weaknesses. For secure environments smart card and b...
This project studies commonly used authentication methods and technologies and evaluates their suita...
The Master thesis work will study and propose how workstation identity management can be made more u...
A mobile single sign on system Today users have to manage a set of username, passwords for every ser...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
The number of different identities and credentials used for authentication towards services on the I...
In today's era of technology, information can revolve the whole world within seconds via Internet. D...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
E-business has been booming for years; however, transaction security is still the biggest worry in t...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
The paper presents the process of user authentication on Windows operating systems. What is also dis...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Abstract The design of authentication methods raises crucial questions on how to solve conflicts bet...
Password-based logon schemes have many security weaknesses. Smart card and biometric based authentic...
Password based logon schemes have many security weaknesses. For secure environments smart card and b...
This project studies commonly used authentication methods and technologies and evaluates their suita...
The Master thesis work will study and propose how workstation identity management can be made more u...
A mobile single sign on system Today users have to manage a set of username, passwords for every ser...
With high risk services, such as online banking, coming to the Internet, traditional authentication ...
The amount of sensitive information stored in different online services is rapidly growing in tradit...
The number of different identities and credentials used for authentication towards services on the I...
In today's era of technology, information can revolve the whole world within seconds via Internet. D...
Nowadays, authentication is usually done by using username and password. They are common and can pr...
E-business has been booming for years; however, transaction security is still the biggest worry in t...
Mobile users desire to have connectivity anywhere and at anytime even in heterogeneous networks wher...
The paper presents the process of user authentication on Windows operating systems. What is also dis...
The growing market of mobile devices forces to question about how to protect users’ credentials and ...
Abstract The design of authentication methods raises crucial questions on how to solve conflicts bet...